Bringing Up the Social Media Baby

According to a Nielsen study, social media is no longer in its infancy. No kidding.

During the November military confrontation between Israel and Hamas, social media played a very grown-up role. What distinguished it from past politically-charged social media exchanges was the participation of state and pseudo-state spokespersons. Official announcements were issued by the Israeli Defense Forces (IDF) and Hamas’ Al-Qassam Brigade via Twitter and Facebook in near real-time.

The IDF announced the initiation of the military campaign via Twitter, and tweeted in caps that it had “ELIMINATED” Hamas military commander Ahmed Jabari in an airstrike.

The Brigade responded with threats of retaliation; both sides posted minute-by-minute updates as the fighting unfolded.

The evolution of social media into an official communications venue should come as no surprise. It follows a time-honored pattern of disruptive ideas and technologies gaining acceptability as they move into the mainstream. The Nielsen Social Media 2012 study tells us that 30 percent of individuals’ mobile device time is spent accessing social media. That qualifies as mainstream.

But the way we are communicating makes things more complicated. Aided and abetted by things like social media and texting, our communications are shorter and snarkier. My Mad magazine and Saturday Night Live-nurtured generation are, as adults, cranking out quasi-news and political satire side by side with serious reportage. The asymmetric nature of online publishing leaves a culturally disadvantaged reader with little to go by in terms of assessing authenticity. We should hardly be surprised that a report from The Onion nominating North Korea’s Kim Jong-Yun as “Sexiest Man Alive” recently was taken seriously by Chinese state media.

This is why the official tweet war between the IDF and Hamas is so disconcerting. It represents the next step in an evolution– which started with tweets by bored narcissists, graduated to activists in Tahrir Square and tweets by The White House pressroom, and ended up with dead-serious war threats. And it is taking place in a medium prone to irreverence and brevity, leaving a lot of room for misunderstanding.

Politicians, journalists, academics, and company executives all have little choice whether to participate; they are expected to demonstrate their fluency with new media and the younger generation. Even the Pope tweets now. The opportunity for things to go wrong leaves a hole big enough to drive an industrial-sized document-shredder through.

The Israeli Defense Forces’ point man on social media—probably the same man who helped engineer the IDF’s communications during the escalation of hostilities with Hamas in November—was found to have posted a photo of himself on Facebook in blackface with the caption “Obama Style”.

A false report alleging that Google had acquired a Wi-Fi provider for $400 million was picked up by several news outlets before it was found to have been intentionally planted.

For now, companies, lawyers, and governments are forced to use a medium with an adolescent propensity to act out, while dealing with very serious issues, including authentication, brand protection, and privacy. Information security specialists, take note:

Online content is being brought as evidence in court cases. This has led to a legal debate over authentication—giving rise to new tools including verified account badges (blue and white check mark icons next to a Twitter tag), as well as more intrusive and time-consuming forensic tools.

In response to the European Union’s Data Protection Directive, Facebook must respond to requests from EU residents with copies of every bit of data it holds on them. According to Kaspersky, one man’s request resulted in 1200 pages of information, including every sent or received message, every person he ever friended, poked, liked, or communicated with. It included information about those friends, such as relationship status, photos, and GPS locations.

Recently, many Facebook users posted a legal disclaimer to their timelines in the hope it would prevent the misuse of their personal information, reflecting widespread confusion over legal use of social media content.

A group of US lawmakers called for the FBI to require that Twitter take down the accounts of U.S.-designated terrorist groups, including Hamas and Hezbollah. Critics argue that these groups may have a legitimate story to tell, and Twitter has made it clear it wants to stay out of political arguments.

Ultimately, the edginess of social media may be blunted by responsible adults when enough damage has been done through intentional manipulation or carelessness, but that seems a long way off. In the interim, when using social media officially or personally, use your inside voice.

Excellent post about what is real and what is no with social media. Everything moves at the speed of now that vetting is more critical than ever. Legal concerns haven't even begin to catch up with today's communication tools and I suspect they never will. Would love to hear more on this subject.

Some of the individuals posting to this site, including the moderators, work for Cisco Systems. Opinions expressed here and in any corresponding comments are the personal opinions of the original authors, not of Cisco. The content is provided for informational purposes only and is not meant to be an endorsement or representation by Cisco or any other party. This site is available to the public. No information you consider confidential should be posted to this site. By posting you agree to be solely responsible for the content of all information you contribute, link to, or otherwise upload to the Website and release Cisco from any liability related to your use of the Website. You also grant to Cisco a worldwide, perpetual, irrevocable, royalty-free and fully-paid, transferable (including rights to sublicense) right to exercise all copyright, publicity, and moral rights with respect to any original content you provide. The comments are moderated. Comments will appear as soon as they are approved by the moderator.